• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 26th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News
Leaks

Secret Pentagon Files Left Unprotected on the Amazon Server

June 1st, 2017 Ali Raza Security, Leaks 0 comments
Secret Pentagon Files Left Unprotected on the Amazon Server
Share on FacebookShare on Twitter

Accidents happen to everyone but according to a recent report, this one is a pretty big one. Apparently, some of the confidential data related to the US military project was simply left completely unprotected on a server belonging to Amazon. The data included over 60,000 files with some of the very sensitive info publicly accessible and not even protected with a password.

That is almost 28GB of confidential data which a contractor from Booz Allen Hamilton (BAH) had left unguarded. BAH is one of the top defense contractors that’s been working for the US and was long considered to be among the best and most profitable spy operations in the world.

Personal data of Booz Allen engineer among the data (Image Credit: UpGuard)

[irp posts=”53237″ name=”Indian Biometric System Data leaked; over 130 M people could be affected”]

Among the data that was left exposed are also the unencrypted passwords belonging to contractors who were granted with the Top-Secret Facility Clearance. If misused, the credentials might lead to a lot of sensitive data leak. The leaked files also mention NGA (National Geospatial-Intelligence Agency), which is a US agency working as Pentagon’s ‘mapmakers.’

BAH has received an $86 million for one of the defense contract projects and it supposedly involved getting and analyzing the data related to geospatial research. This is the data that was collected with the help of drones and satellites. It’s known that the NGA has worked with CIA on many occasions, as well as DIA (Defense Intelligence Agency), and NRO (National Reconnaissance Office).

The server on which the files were left was discovered a week ago by Chris Vickery, UpGuard‘s cyber risk analyst. The server in question mostly contained files that are public, so finding this must have been quite a shock. Especially since the servers used by the US government are always kept on the separate space, which is known as GovCloud. GovCloud is also protected heavily, by both physical and digital security protocols.

Recently discovered data leakage situation report is being written up. Two relevant words: t*p s*cr*t.

Report will likely post Wednesday. pic.twitter.com/dyADMevFEJ

— Chris Vickery (@VickerySec) May 28, 2017

The NGA confirmed the existence of this data. However, they’ve called the data unclassified, but still sensitive. This potential disclosure was taken very seriously, and the affected credentials were immediately revoked, as the NGA claims. Apparently, none of the classified info got out, which was a lucky coincidence.

Unfortunately, this wasn’t an isolated incident, but rather the last in the series of the unsecured server incidents that are giving away sensitive data. Another incident from earlier in this very year involved a backup drive that wasn’t protected even by a password. With such poor security, it’s not a surprise that the sensitive info related to the US Air Force members has leaked.

[irp posts=”53270″ name=”Anti-Public Combo List with Billions of Accounts Leaked”]

BAH has stated that the files left unprotected are now secured and that the complete investigation is being carried out. So far, they claim to have found no evidence of any classified data being compromised. This organization was once the employer of the NSA whistleblower Edward Snowden. Snowden, as you probably know by now, has copied and publicly released a lot of the classified information without any authorization.

BAH was supposedly also hacked by Anonymous, back in 2011. During the hack, over 90,000 emails were said to be stolen, as well as login information for several of the personnel that’s working for multiple military-related government organizations.

Source: CyberreSilience | Via: Gizmodo | Image Credit: Shutterstock/Faithie


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • Amazon
  • Data
  • internet
  • LEAKS
  • Military
  • NSA
  • Privacy
  • security
  • Snowden
  • USA
Facebook Twitter LinkedIn Pinterest
Previous article Ransom Fail: Hackers Leak Thousands of Naked Photos of Plastic Surgery Patients
Next article Password manager "OneLogin" hacked; data stolen
Ali Raza

Ali Raza

Ali Raza is a freelance journalist with extensive experience in marketing and management. His work has been featured in many major crypto and tech websites including Hacked, Hackread, ValueWalk, Cryptoslate, CCN, and Globlecoinreport to name a few. Raza is the co-founder of 5Gist.com, too, a site dedicated to educating people on 5G technology.

Related Posts
SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Man jailed after attempting to buy 3-year-old girl on dark web
Cyber Crime

Man jailed after attempting to buy 3-year-old girl on dark web

62
SonicWall hacked after 0-day flaws exploited by hackers
Hacking News

SonicWall hacked after 0-day flaws exploited by hackers

114
Massive privacy risk as hacker sold 2 million MyFreeCams user records
Cyber Crime

Massive privacy risk as hacker sold 2 million MyFreeCams user records

153

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us